This exploit leverages a sqli vulnerability for authentication bypass,together with command injection for subsequent root RCE.

To use the exploit as written, make sure you're running a reverseshell listener somewhere, using a command like:

$ nc -nlvp 1234

Then, just specify the ip and port of the remote listener in the exploit command. Alternatively, modify this exploit to contain a command of your choosing by modifying the 'cmd' variable below.###############################################################################"""